into RFID Anonymous 05/09/2021 (Sun) 17:49:45 [Preview] No. 14721 [Reply] [Last 50 Posts]
So I want to get into RFID. I'm no programmer, I'm basicaly a low-level IT support guy, with very basic code understanding (studied C, Html/CSS and java just a bit). I'm interested in RFID about my company's vending machine, but also about subdermal implants, and maybe in the future for malicious intents.
Can anyone point me on some ressources, or even just share some RFID dumps I could study/compare?

Anonymous 05/09/2021 (Sun) 18:26:58 [Preview] No.14722 del
I know it's not quite as simple as the fear-mongers want to present it as.

At work, all our items are tagged, now instead of just an external barcode but also an internal RFID tag. Even buying them 100K at a whack they were $0.40/ea.
And fifty or so people were set aside to go through and tag everything we own.
Three years later as we move equipment from office to office we start finding errors. Serious errors. Turns out our tracking vendor had settled on one particular tag format, our software didn't have that so we'd chosen something "pretty close" but our vendor went through a small, internal reconstruction and came out using their information a bit differently. Our software couldn't read their tagged information and it took months of experts scratching their heads to figure out that "pretty close" wasn't close enough.

SO the big bosses sent out emails that "hey, you guys, you've been doing it wrong all this time shame on you."
And politely refused to take note of how those bosses' trained people set up all our equipment on what turned out to be a misunderstanding.

Reading the tag isn't all that hard -- any antenna can energize and read off the contents. But you might need a human to interpret the results, especially if the tag format they're actually using is different from the one they publish that they agreed to use.

Sorry I can't be of more specific help, but searching out the high-level tag datasheets might be an okay start.

Anonymous 05/10/2021 (Mon) 12:12:29 [Preview] No.14723 del
it all comes up to Read the Fucking ManIal you Dumb fuck. but yeah is not as hard as a teenager's dick.

Tabernam guns Anonymous 05/10/2021 (Mon) 18:52:16 [Preview] No.14724 del
Innoxius Tabernam sells the most popular firearm models with a great stock, for private use and for customers of all kinds. No matter what you prefer shooting, be it handguns, rifles, smgs or just purchasing ammunition, Innoxious Tabernam has a gun to suit your needs and fill your requests. Innoxius Tabernam offers known and reliable firearm brands such as Springfield, Ruger, CZ, selection of AK surplus and many others. Browse the selection of firearms in stock and have it delivered to you in the most secure and fastest way possible.

The Crypto Lifestyle Anonymous 05/08/2021 (Sat) 10:59:46 [Preview] No. 14720 [Reply] [Last 50 Posts] [Embed] [Embed]

(399.35 KB 342x342 tamborin.gif)
Anonymous 10/27/2020 (Tue) 18:11:58 [Preview] No. 14411 [Reply] [Last 50 Posts]
Ok, people on here, help me. The pic is pretty unrelated, sorry for that, haven't found anything better on my pc, meh. I have been learning some programming and unix-stuff like 2 years ago, first I got into Soython, simply because it was the best option, at least in terms what I thought. Later I got into Webcringe, learning all kinds of JS-frameworks and PHP and later even Java. Recently I got into Common Lisp, C and proper Shell scripting. In these two years, I have written some tiny scripts, but nothing I would show something. I basically haven't done anything useful or something to be proud of so far. Am I really just too retarded? I am 14 atm, I know the rules, but this board is dead enough, as that I hope that it is ok for the mods, idk.
underage b&
22 posts and 6 images omitted.

:)) hi Anonymous 04/23/2021 (Fri) 16:43:34 [Preview] No.14697 del
(24.62 KB 242x300 sunguy.jpg)
(58.06 KB 286x222 woche.png)
(41.24 KB 474x586 bignoseman.jpg)
Oh, god.

OP back ^^, guess even more time has past, guess I should have done something else with it than shitposting. I don't know, feels kinda weird looking back to this thread after so long. Just have some random images here. Well, guess I actually managed to get into Lisp and I got fairly good at it - thanks for all the advice.

Enjoy your day! <<3 ( if this is anyone even reading in 2021 )

Anonymous 04/23/2021 (Fri) 19:31:49 [Preview] No.14699 del
Kill yourself

Anonymous 04/23/2021 (Fri) 20:39:41 [Preview] No.14700 del
(15.97 KB 600x600 clownwojak.png)
>:(( meany

sage Anonymous 05/07/2021 (Fri) 05:08:54 [Preview] No.14714 del
>Kill yourself
Yep, that's what I'd recommend you do. Not like anyone would miss your faggot ass

Anonymous 05/08/2021 (Sat) 00:29:51 [Preview] No.14717 del
do k&r for c and install openbsd or something. look into 9front. that's the stuff i like though don't know what you want to do, but yea you'll be extra cool and not soy if you do those things generally. you're very young so props. k&r is attached here

Darkweb Intro Anonymous 08/15/2019 (Thu) 12:03:20 [Preview] No. 13454 [Reply] [Last 50 Posts]
Alright, could anyone give me a basic bitch primer on dark web for little babbies? My knowledge at the moment is limited to Tor, and the onion addresses for the hidden wiki, and the onion address for Endchan. I'm starting to realize given how every site I liked has been shut down, switched domains, DDOSed, put on watchlists, or made 'registration only' on clearnet channels (a sidenote: I would have thought this would have happen to the porn sites I visit, but oddly enough, those are A-OK on clearnet) that I need to go ahead and plan for the future and just move whole-hog to Dark Web. To those who wil say I'm a little late to figuring this out: you're right. Here's what I would like if anyone can supply it:

- What are all the darkweb channels? Tor, I2P, Zeronet, I missing any?
- Any basic tips on general usage/quickstarts for each channel. Pros/cons of each.
- Good starter websites for each. I'm particularly interested in news/forums, and any libertarian websites.

Thank you very much m(_ _)m
7 posts omitted.

Anonymous 09/22/2020 (Tue) 15:00:03 [Preview] No.14312 del
There are (were) some websites with clearnet/Tor/I2P addresses, just like normal (centralized) chans. The admins of those websites had the NNTP software running the background, so everything got sync'd between their nodes.
Quite frankly the web nature is unnecessary and it should just be straight text like Usenet, with some binary groups. No fucking web interface! Just plain old news readers, like before everything went full nigger.

bestonion exists Anonymous 09/23/2020 (Wed) 19:08:55 [Preview] No.14318 del
(7.84 KB 558x135 hewwo_anon_kun.png)
hello, anon.


>no rules, no logs
>file upload
>privatebin clone
>CloverOS/Gentoo binhost
>irc plain (6667) and tls (6697)
>http or https, verifiable cert
>checks all the top onion sites if they're online

bestonion exists, anon!

Anonymous 05/07/2021 (Fri) 13:57:47 [Preview] No.14715 del
>- What are all the darkweb channels? Tor, I2P, Zeronet, I missing any?
For what it's worth I've also heard of lokinet although I've never used it myself.
>- Any basic tips on general usage/quickstarts for each channel. Pros/cons of each.
I've heard that I2P is good for torrenting and that letting it run for a long time reduces latency if I remember correctly. Make sure you're honest about your bandwidth in the settings. In I2P every user is used as a router, unlike Tor where you have to explicitly set yourself up as a node yourself. Just making sure you know.

Anonymous 05/08/2021 (Sat) 00:23:55 [Preview] No.14716 del

(203.38 KB 1441x586 qj5t97qijkhz.png)
Your trusted VPS recommendations the hacker known as 4chan 09/27/2020 (Sun) 19:38:21 [Preview] No. 57 [Reply] [Last 50 Posts]
Except for dumb stuff like digitalocean, aws, vultr, linode
2 posts omitted.

the hacker known as 4chan 01/18/2021 (Mon) 05:36:46 [Preview] No.74 del
>owns vpn company that can't be tracked

the hacker known as 4chan 04/08/2021 (Thu) 13:38:36 [Preview] No.92 del

the hacker known as 4chan 04/15/2021 (Thu) 09:37:47 [Preview] No.93 del
linode is pretty based

the hacker known as 4chan 05/05/2021 (Wed) 08:55:28 [Preview] No.99 del

the hacker known as 4chan 05/08/2021 (Sat) 00:19:46 [Preview] No.103 del
gay image
use frantec, its bretty based and cheap

(1.38 MB 2552x1204 banger.png) [Embed] [Embed]

check out these new excellent videos from The Cryto Lifestyle

#thecryptolifestyle the hacker known as 4chan 05/05/2021 (Wed) 20:10:45 [Preview] No. 101 [Reply] [Last 50 Posts]
excellent video [Embed]

(1.02 MB 891x902 xrctfy-.png)
Chaosesque anthology deleted from moddb the hacker known as 4chan 05/04/2021 (Tue) 20:08:28 [Preview] No. 96 [Reply] [Last 50 Posts]

> Game Over

>The game you are trying to view has been deleted and is no longer available. This may have occurred at the developers request because it is no longer active and was not released, or it may have occurred because it violated the sites Terms of Use. If this is a mistake and you are a member of this games team and would like it re-activated, please contact us with the details.

>Continue browsing the game list, to find the profile you are after.

>Account Banned

>Your account has been banned. If you believe this is a mistake and want to be unbanned, please contact us. Try searching:

(534.27 KB 683x469 picture.png)
The Crypto LIfestyle crypto69 05/04/2021 (Tue) 22:18:57 [Preview] No. 98 [Reply] [Last 50 Posts]
Check out The Crypto Lifestyle's last value packed Stream about presales! [Embed]

OPSEC Endwall 08/23/2016 (Tue) 01:08:39 [Preview] No. 357 [Reply] [Last 50 Posts]
Discuss best practices for operational security.
20 posts omitted.

Endwall 10/20/2018 (Sat) 04:58:20 [Preview] No.1329 del

While I think this is good, for memorization, I use 25-40 character random ascii passwords using /dev/urandom or I write these down in a notebook that I keep in a small safe in my computer room/ study. I
also add random characters inserted into the computer generated password. Some of these passwords are memorized
and not written down anywhere. For example the codes I use for user login and for cryptsetup and gpg are
memorized, while the codes for github, protonmail, and other online services are written down in a notebook that I keep in a safe. I use different passwords for every distinct online service.

Ultimately I would want a system as follows: 2 factor authentication, Factor 1 would be a 20-30 character
memorized passphrase number combination as mentioned above in >>1328 or using random memorized ASCII like I currently do. Factor 2 would be a 3.5" floppy disk with 1.44MB of random ASCII characters generated using OpenBSD on a Sun Sparc or DEC Alpha air-gap computer, with read only permissions and a hash, and the write protect toggle on. You would boot
your computer using both the disk key with the non-guessable ,random passphrase and with the memorized code.
You would keep the key in a safe in your study when not in use or on your person 24/7. Preferably you would
need both keys to open the encrypted computer. The memorized passphrase would allow you to boot to the point
where you need another key to decrypt the entire volume. This second stage uses a non dictionary, anti-brute
force password consisting of 1.44MB of random ASCII, that can't be guessed or memorized, stored on a floppy disk
for rapid destruction by neodymium magnet, mechanical shredding, and burning with a lighter. Once the volume is unlocked the computer should instruct you to remove the disk from the drive and stow it away, so that the OS never gets to or has the chance to read the contents of the disk once authenticated.

Message too long. Click here to view full text.

Anonymous 11/27/2018 (Tue) 22:41:04 [Preview] No.1345 del
Have you used uMatrix before?
Very similar idea to this 3P blocker except you can specify what type of content you want blocked. I.e. XHR, JavaScript, iframes, CSS, fonts, etc.
I swear by it. It's very useful, the interface takes a little to get used to but once you do you can work very efficiently with it.

Anonymous 03/21/2019 (Thu) 09:13:24 [Preview] No.1383 del
nice try grandpa
are you aiming for privacy, anonymity, security? VMs are unreliable from a paranoid security standpoint due to complexity, nevertheless if they provide anonymity, it may be worth it against larger foes that can compromise security with their access to exploits. Similarly with Tor Browser Bundle, sometimes it is better to blend in rather than to obscure your identity. a hoodie will be less conspicuous than a facemask.
>don't post modern photos except PNGs because of exif
you can strip exif data using 'exiftool' and other solutions. I have heard stories about cameras having hidden codes (and more likely, repeatable and detectable design flaws) that can be used to identify the module, but that's real rumor oojie boojie
>avoid all digitized vehicles
avoid vehicles especially with push-button ignition, vehicles with a disabled wireless unlocking mechanism would be preferable but there are vehicles with an option to disable the keyless wireless fob.

>don't use social media
endchan is social media
>use a cheap private vpn
use someone else's vpn, don't leave a paper trail of payment leading to your credit card
>do not buy green appliances
enjoy getting vanned because your electricity company can tell when you're browsing the internet via the smart meter. green is just a color, but energy efficient appliances are easier to run off battery power and/or solar power sources.
>responding to phishing attempts at all

Message too long. Click here to view full text.

Anonymous 03/29/2019 (Fri) 21:15:48 [Preview] No.1385 del
(91.93 KB 400x400 glownigger.png)
Don't use smartphones.

Anonymous 05/03/2021 (Mon) 06:22:08 [Preview] No.1722 del
I'm not an expert but I have an IQ over 9000.
How I might attack a password.
A. List attack
I will get a list of "common passwords" derived from compromised user password list (the user account you made in ten seconds, 5 month ago because some Jew webpage made you).
>"12345678" and "nopassword".
B. low entropy Brute force of the password list
Common passwords with one character variance, common passwords with 2 character variance.
>1234s6789, Nopassword1
The site made you add a symbol and a number, I'm so scared.

It's only if you got this far that any real effort has to be made, honestly if you're not special I will just give up and find a stupider person.

C. dictionary attack
Instead of guessing gibberish I will use whole words.
Long passwords are often made up of whole words and at this point I know your password is fairly long.
There are far more words in any given language than characters (this BTFO's Chinese users incidentally).
Many common phrases will already have been covered in A. "common passwords"

Message too long. Click here to view full text.

Cryptography Endwall 05/12/2018 (Sat) 20:26:54 [Preview] No. 1211 [Reply] [Last 50 Posts]
In this thread we will discuss cryptography, cryptosystems, crypt-analysis, and tools for cryptography such as gpg and other tools. If you work in this field or hear of some relevant news about this field feel free to contribute. Use hyperlinks and source citations to back up any claims made if necessary.
15 posts omitted.

Endwall 09/23/2019 (Mon) 03:31:11 [Preview] No.1469 del
Yeah that's probably faster/smarter to get the Americium from a smoke detector. Good call.

Anonymous 10/14/2019 (Mon) 19:23:20 [Preview] No.1477 del is a decent overview of _contemporary_ cryptography, not the usual textbooks

Anonymous 11/14/2019 (Thu) 03:21:11 [Preview] No.1495 del
and it should work the same, right? just a button of a different material.

Endwall 11/15/2019 (Fri) 02:36:19 [Preview] No.1498 del
Any radiocative isotope of an element should work. In the video he's using Americium from a smoke detector. You just need some random gamma and beta radiation from a decay event to set off the Geiger counter. Any radio isotope will do. Radioactive decay times and quantities are random and unknowable before the event occurs.

Anonymous 05/03/2021 (Mon) 03:27:01 [Preview] No.1721 del
(21.11 KB 336x336 Youdontsay.jpeg)
How does a crypto operator in a client relationship protect themselves against duress?
We are already starting to see digital robberies, because crypto clients are typically anonymous and can use a range of access point the rick of Crypto-ATM robberies is increasing.
A two factor authorization and a silent alarm would be easy to set up- but this presents the risk that the silent alarm keeper could freeze accounts and make demands of clients.
A "two key" system can be used to ensure transactions and blocks are only made with the simultaneous cooperation of the Client and broker, but as with TOR if unilateral blocking is not possible the systematic takeover of brokering services is likely to eventuate.
While in theory if the broker was a bad-actor they still wouldn't gain access, the client would loose their protection without their knowledge- and a large number of bad-actor brokers would emerge to net a large number of clients.

Is this a problem inherent to a single origin (client centered) authorization chain?
Could the blockchain work in tandem in a two factor access system?

Cute cat CCAT Anonymous 05/01/2021 (Sat) 19:56:39 [Preview] No. 14708 [Reply] [Last 50 Posts]
Hello, my name is Dean and I'm one of the developer of Cutecat2.0.

Not sure if you heard about us yet, but I'll try to explain it in a few words.

Cutecat2.0 is 2 weeks old and built on the BSC, we are currently developing gaming and nft for our project. Since this is our first project, we are fully dedicated to it, and to its success.

I know you are reading about great communities everyday, but this one really is. A lot of members are doing their part even without me knowing about it, and I think, that's one of the best part of this community.

I know much this project can grow, I can promise that we will give all of me go make this succeed. There is a huge path in front of us, but together we make this the number one BSC token.

Sincerely, your Cutecat2.0 developer.

Below you can read most important information about project.

🔰Launched on 16th April 2021
❇️Initial supply: 1,000,000,000,000 CCAT

Message too long. Click here to view full text.

Anonymous 05/01/2021 (Sat) 20:00:34 [Preview] No.14709 del
$CCAT is going to break ATH within few days

Anonymous 05/01/2021 (Sat) 20:02:40 [Preview] No.14710 del
Thank You.. Just bought 100,000

Anonymous 05/01/2021 (Sat) 21:09:43 [Preview] No.14711 del
meow me up!

Anonymous 10/27/2020 (Tue) 03:18:45 [Preview] No. 14405 [Reply] [Last 50 Posts]
How accurate is this picture?
4 posts omitted.

sage sage 10/29/2020 (Thu) 05:26:17 [Preview] No.14422 del
4chan's /tech/ board already had something like this, except it was actually good. None of those pictures are good or funny

Anonymous 04/27/2021 (Tue) 03:26:47 [Preview] No.14703 del
>GTK3 GTK2 QT are all bad
What am I supposed to use then?

Anonymous 04/30/2021 (Fri) 06:58:03 [Preview] No.14705 del
where ruby?

Anonymous 05/01/2021 (Sat) 00:04:41 [Preview] No.14706 del
windows api

Anonymous 05/01/2021 (Sat) 02:19:07 [Preview] No.14707 del
lol no. portability is a good thing.

Anonymous 10/18/2020 (Sun) 21:02:35 [Preview] No. 14379 [Reply] [Last 50 Posts]
I need a bot that can automatically create threads with predetermined strings as well as bump threads with predetermined replies. I am going to use it on the faggots at

I'm willing to pay $200 in bitcoin if anyone can point me in the right direction. Captcha isnt a problem becuase I will be using 4chan pass.

Anonymous 10/18/2020 (Sun) 21:32:51 [Preview] No.14380 del
Create it yourself faggot

Anonymous 10/27/2020 (Tue) 03:31:00 [Preview] No.14407 del
What are you going to do on biz

Anonymous 04/27/2021 (Tue) 03:47:27 [Preview] No.14704 del
I have never used it before but here is 4chans api
It is read-only though, so you will have to use some sort of web-scraper program to post, so you might as well use it to parse the threads as well. There are python libraries that make the process dead-easy, especially if you aren't making requests very frequently.

(27.66 MB 1280x720 main.mp4)
Tesla’s Autopilot is ‘easily’ tricked into working without anyone in the driver’s seat Anonymous Board owner 04/22/2021 (Thu) 18:19:48 [Preview] No. 14695 [Reply] [Last 50 Posts]
Consumer Reports said Thursday it was “easily” able to trick Tesla’s Autopilot system to operate without anyone in the driver’s seat. The publication’s test came amid questions about the safety of the company’s advanced driver assist system in the aftermath of a fatal crash in Texas in which authorities said there was no one behind the steering wheel.

Using a weighted chain attached to the steering wheel to simulate the pressure of the driver’s hands, two Consumer Reports researchers were able to use the steering wheel dial on a Tesla Model Y to accelerate from a full stop, and then “drive” around on a closed-course test track for several miles — all while sitting in the passenger seat and backseat. They stopped the vehicle by again using the dial to bring the speed back down to zero.

Tricking the Tesla to operate without someone behind the wheel was as simple as keeping the driver’s seatbelt buckled, not opening the driver’s side door during the test, and using the weight to simulate hands on the steering wheel.

“The car drove up and down the half-mile lane of our track, repeatedly, never noting that no one was in the driver’s seat, never noting that there was no one touching the steering wheel, never noting there was no weight on the seat,” Jake Fisher, CR’s senior director of auto testing, said in a statement. “It was a bit frightening when we realized how easy it was to defeat the safeguards, which we proved were clearly insufficient.”

Anonymous 04/25/2021 (Sun) 03:45:52 [Preview] No.14701 del
What is their point? They could put a brick on the gas pedal of a Mack truck too. Anybody can do stupid shit with all kinds of machines. You can kill a baby by putting it into a Maytag dryer for two minutes. You can *easily* duct tape a chainsaw kickback guard in place and chainsaw your skull open on the first good knot you hit. Why do people occasionally start apparently mumbling something about Teslas somehow being different from any other machine that even a drunken hillbilly can figure out ways to circumvent safeguards on?

If their point is that using weighted neural nets that are virtually impossible to debug to direct millions of 2-ton projectiles at 60 miles per hour on public roads is completely unacceptable to many taxpaying users of those same roads, then they should come out and say that specifically. Nibbling at the edges of that with safeguard circumvention nonsense (which will always be possible with any kind of machinery and any level of safeguarding and is unrelated to the what-we-do-with-neural-nets issue.)

Anonymous 04/25/2021 (Sun) 07:27:53 [Preview] No.14702 del
They are working for Chinese intelligence(free of charge), that's the point.

(55.23 KB 1024x768
/vnc/ general Anonymous 02/25/2021 (Thu) 02:32:53 [Preview] No. 1598 [Reply] [Last 50 Posts]
Pwn the chink edition
Come explore the internet with other Anons
Well let's give finalchan a go
105 posts and 13 images omitted.

Anonymous 04/18/2021 (Sun) 17:43:59 [Preview] No.1715 del
There may be alternate sites, you can even make your own frontend using the script.
Or even make your own script, and well integrated, because the one ComputerNewb made is split across 3 files and in his own words "is a bit bad".
Check if they are OK with mass scans. It's one of the things many will ban you over.

Anonymous 04/18/2021 (Sun) 17:44:28 [Preview] No.1716 del
By "many" I was thinking of VPS'.

Anonymous 04/21/2021 (Wed) 17:51:05 [Preview] No.1717 del
Has anyone figured out how to escape an X11 desktop (like "nobody's x11 desktop" in the title) in vnc?

Anonymous 04/22/2021 (Thu) 07:56:18 [Preview] No.1718 del
some oil thing

Anonymous 04/25/2021 (Sun) 01:50:24 [Preview] No.1720 del
I don't think you can. I haven't found a app or software that hides your device name

(31.39 KB 232x100 1571064253512.png)
Literally No Reason To Not Use Windows 10 Anonymous 11/14/2020 (Sat) 02:06:04 [Preview] No. 14460 [Reply] [Last 50 Posts]
And you're telling me you can't afford a $200 PC from the past 5 years that will run it seamlessly? Sell your 15 year old Thinkpads that can't even into AVX or non-fixed pipeline GPUs.
Have you anything to hide? No one cares about you. You aren't developing anything significant. You aren't a threat to the current ecosystem. You aren't a terrorist/spy/lone-wolf actor. FVEY has better places to spend its resources on. You're already being watched with facial recognition, Low-Earth orbit imagery satellites, and backbone-level deep-packet inspection.
You can disable the telemetry in settings. Go a step further too and get the Enterprise edition with minimal software preinstalled.
In the beginning? Sure, but now its quite stable, and you'll be hardpressed to come across any problems. Linux, on the other hand, presents you with hours of work, ranging from broken audio to missing files to a lack of hardware and application support.
You're paying for consistent updates and almost full support for any and every application in existence. The user experience and interface is only beaten by Mac OS from Apple, and is lightyears ahead of anything Linux could bring to the table.
You don't take advantage of FOSS. You've never looked into the software to determine how it works.
And Stallman is a foot-eating pedophile. Separate the art from the artist.
Windows is utilitarian with a focus on getting shit done. It won't waste your time with hundreds of customizable options and features. It just works. Imagine spending 10 minutes writing assembly code every time you wanted to use your microwave. The people who use windows only care about the applications inside of it, not stupid crap like sub-pixel rendering and kernel parameters.
Your elitism is nothing. "Normal" people are happy, fulfilled, and have their heads on straight. You on the other hand have spent countless hours behind a screen, posting on strictly anonymous websites, angry about the state of the world and how you're so much better than everyone else.
>FUCK YOU!1!!!1!

Message too long. Click here to view full text.

30 posts and 12 images omitted.

Anonymous 04/13/2021 (Tue) 03:02:54 [Preview] No.14680 del
(5.19 KB 640x480 out.png)
No, it's Armbian (based on Ubuntu) that I customized heavily. I don't use systemd, pulseaudio, networkmanager, or other bullshit like that. I don't use Xorg most of the time. These screens are from me:

Anonymous 04/15/2021 (Thu) 09:39:35 [Preview] No.14681 del
didn't care; linux is still superior. btfo kike

Anonymous 04/15/2021 (Thu) 09:45:06 [Preview] No.14682 del

Anonymous 04/15/2021 (Thu) 23:24:45 [Preview] No.14684 del
(4.55 KB 640x480 out.png)
That's just an ANSI from, so you can grab them from there if you want.
Here's something cool though: 8086tiny. It's an emulator that supports text mode output. It translates CGA text mode video memory ops to the equivalent ANSI terminal escape sequences. So with any decent terminal (that allows you to load a Codepage 437 font) you can play old school DOS text games without needing any kind of graphics device at all. So here is ZZT running on my Linux terminal.
I tried running it in a GNU Screen session, and that works too, but sometimes the characters aren't aligned exactly right. I guess that's just expecting too much, so instead I run it on a bare tty.

Anonymous 04/23/2021 (Fri) 18:09:21 [Preview] No.14698 del
Look at this, a Microsoft shill. Unsurprising.

Hardware Endwall 09/18/2016 (Sun) 18:31:31 [Preview] No. 580 [Reply] [Last 50 Posts]
Discuss hardware and alternative hardware concepts to increase computer and online privacy and security.
Edited last time by Endwall on 09/18/2016 (Sun) 18:50:04.
9 posts and 1 image omitted.

Endwall 09/03/2017 (Sun) 23:52:30 [Preview] No. 1011 del

RC2014 is a simple 8 bit Z80 based modular computer originally built to run Microsoft BASIC. It is inspired by the home built computers of the late 70s and computer revolution of the early 80s. It is not a clone of anything specific, but there are suggestions of the ZX81, UK101, S100, Superboard II and Apple I in here. It nominally has 8K ROM, 32K RAM, runs at 7.3728MHz and communicates over serial at 115,200 baud.

RC2014 is available in kit form for you to solder together.  Through-hole components are used throughout, making soldering easy, even for those with limited soldering experience.  Along with a selection of modules to extend functionality, such as serial terminals with HDMI output, digital input modules or, simple keyboard, the RC2014 is a very adaptable computer.

Assembly guides can be found here:

Module information including schematic diagrams and technical descriptions can be found here:

GitHub repository can be found here:

Google Group for RC2014 owners can be found here:

Message too long. Click here to view full text.

Endwall 09/04/2017 (Mon) 00:33:49 [Preview] No. 1012 del
As soon as you turn RC2014 on you can start programming in Microsoft BASIC.  This is very easy to get started with and some very complex programs can be written.  To get right down to the metal, though, you can write your programs in Z80 machine code.

Development of the RC2014 has lead to a more powerful machine with pageable ROM, 64k RAM, compact flash storage and a whole range of expansion peripherals.  With the right modules, it’s now possible to run CP/M, which opens the RC2014 up to a wide range of software.

RC2014 can be bought from Tindie:

Endwall 09/06/2017 (Wed) 21:07:20 [Preview] No. 1016 del

Z80 Retrocomputing 18 - Z180 CPU board for RC2014 [Embed]
Dr. Scott M. Baker
In this video, I build and try out a Z180 CPU board to replace the Z80 CPU in my RC2014 retrocomputer. Aside from simply being faster than the Z80 that I'm currently using, the Z180 offers a lot of on-board peripherals (serial IO, timers, interrupt controller, mmu, dma, etc). I benchmark the 20 Mhz Z180 against my 7.3728 Mhz Z80. I'm saving exploration of the onboard peripherals for a future video. For more retrocomputing projects, see

YM2149/ AY-3-8910 Sound Card for the RC2014 computer [Embed]

rc2014-ym2149 Designed by Ed Brindley
Demonstration of my sound card for the RC2014 computer. The board is Open Hardware and was produced entirely with Open Source Software (as was this video) PCB now available on Tindie:
Schematics and Gerbers for the board are available here:
Edited last time by Endwall on 09/06/2017 (Wed) 21:07:58.

Anonymous 04/22/2021 (Thu) 22:52:38 [Preview] No.1719 del
make a guide for new people niggers
also join

(133.24 KB 420x280 rms_march_21.png)
Anonymous Board owner 04/22/2021 (Thu) 18:01:20 [Preview] No. 14694 [Reply] [Last 50 Posts]
Richard Matthew Stallman is based.

Anonymous 05/05/2021 (Wed) 22:47:00 [Preview] No.14713 del
RMS is a moron and he should stay out of FOSS and the FSF for good.

(496.20 KB 707x1000 1599184555858.png)
Facebook Hack Anonymous 04/15/2021 (Thu) 23:00:19 [Preview] No. 14683 [Reply] [Last 50 Posts]
Who has a link to the dump of that facebool hack from a few weeks back?

Anonymous 04/16/2021 (Fri) 05:29:10 [Preview] No.14685 del

Anonymous 04/22/2021 (Thu) 17:51:33 [Preview] No.14693 del
if u mean the facebook leak there it is all i have:

(305.13 KB 640x974 squidgirl.png)
What RMS's apology should have been, with annotations the hacker known as 4chan 04/16/2021 (Fri) 03:52:52 [Preview] No. 94 [Reply] [Last 50 Posts]

"Some have described my co-ethnic Dr Jeffery Epstein as a paedophile. In their minds he preyed upon the types of little girls you see in your anime cartoons. Let us not debate if this was true or not. The fact is that if it were true then Dr Epstein's fault was that he did not indeed collect the little girls in permanent tribute to himself, and he did not indeed pay the proper bride price to their fathers (50 shecks of silver); as our G-d, and the only g-d, has set forth as the procedure in Devarim chapter 22 verse 28."

>Instead we get:
> Some have described me as being "tone-deaf," and that is fair. With my difficulty in understanding social cues, that tends to happen. For instance, I defended Professor Minsky on an M.I.T. mailing list after someone leaped to the conclusion that he was just as guilty as Jeffrey Epstein. To my surprise, some thought my message defended Epstein. As I had stated previously, Epstein is a serial rapist, and rapists should be punished. I wish for his victims and those harmed by him to receive justice.

"The true facts are that my fellow Dr. , Sir Epstein, simply had relations with allready-broken-in shiska whores (but I repeat myself), [(If anything it should be their "boy friends" (what the cattle call those who are actually, if we follow the Torah; their husbands: having deflowered them initially) who should be angry)], who were well above the age of niddah; and could not fully and properly be described as na'ar. They were women."

>Instead we got:
>False accusations -- real or imaginary, against me or against others -- especially anger me. I knew Minsky only distantly, but seeing him unjustly accused made me spring to his defense. I would have done it for anyone. Police brutality makes me angry, but when the cops lie about their victims afterwards, that false accusation is the ultimate outrage for me. I condemn racism and sexism, including their systemic forms, so when people say I don't, that hurts too.

"False accusations of paedophillia; that is: the taking of the flower of youth when that flower has already past; serve only to distract from the real injustice. The injustice of the degrdation and disregard of G-d's Law."

Message too long. Click here to view full text.

se7en#0EK0Fx Global volunteer 04/17/2021 (Sat) 21:46:18 [Preview] No.95 del
Stallman is apostate, nigger

(119.89 KB 1024x625 5ffb722b48f05.jpg)
All v3 Onion Addresses Down After Attack On The Tor Network Anonymous 01/10/2021 (Sun) 21:32:39 [Preview] No. 14564 [Reply] [Last 50 Posts]
>You will currently not be able to access any v3 onion addresses, what is happening is unknown, but it is potentially a huge attack on the entire network. Earlier today I made a post outlining consequences I would be putting into place to deter markets from funding DDoS attacks against each other, as the potential to scale and completely kill every node on the network is a very real potential outcome. Now everything is down and I have no idea if this has sped up the process of this occurring or if it is even an attack at all, all I know is, this is big.

>This attack began after Dread forum owner, HugBunter made a post stating the consequences for market owners who continue to attack rival markets.

I didn't know Tor was this shit and prone to attacks tbh. Makes it a lot more unreliable.
What's a good Tor alternative? I2P?
16 posts and 1 image omitted.

Anonymous 01/28/2021 (Thu) 01:02:29 [Preview] No.14612 del
Seems like it's happening again or is it just me?

Can we have a list of v2 addresses going?

Anonymous 01/30/2021 (Sat) 19:22:46 [Preview] No.14614 del
Here's a post by an expert on the whole situation.

The vast majority of people using Tor don't even visit onion sites in the first place. Most people use it either to get around censorship of the clearnet or for muh privacy. All of the FUD you see about redrooms or hitmen is sensationalist garbage made up by the mainstream media.
I've seen the spam claim a lot but never really seen any proof of it. I know of plenty of sites (including this one) that allow posting through Tor and aren't spammed to hell. Why does it have to be Tor, anyway? What's to stop people from using a VPN to spam?

DAY OF THE SEAL.JPG Anonymous 02/02/2021 (Tue) 01:35:54 [Preview] No.14619 del

Anonymous 03/16/2021 (Tue) 02:31:36 [Preview] No.14658 del
Well the relays that make up the TOR overaly network are known by the public, and given the state of most ISPs ignoring basic ingress/egress filtering when it comes to packet transmission can make a denial of service attack a possibility. Its sad how techniques like these still work now a days. Heck, the recent bugs leveraged with microshits exchange server software made my day.

Anonymous 04/17/2021 (Sat) 13:26:48 [Preview] No.14686 del
>>1461 I wana see how much of a badass you are, come on bitch give me your address. i'll fuckin waste ya!

All AMD Processors Since Phenom II Have BadBIOS Circuitry That Leaks to the Military Anonymous 03/28/2021 (Sun) 18:05:00 [Preview] No. 14665 [Reply] [Last 50 Posts]
Title gives my conclusion from empirical events I witnessed and inside info. PSP runs on the same circuit, but isn't the backdoor per se, which has been around for much longer.

The same way AMD was able to change the crypto algorithms for the Zen chip they licensed to China, they can change how the CPU behaves at any system, even those already deployed. This can also be used to sabotage any program or computation, making BadBIOS vastly nastier than Stuxnet.

American military made a grave mistake to partner with the morons of the Brazilian military, who are letting knowledge of this spread like a fire (and misusing it for petty profit and inside jobs to justify a police state). Israel, UK and France also have access, but are much more professional.

Anonymous 04/01/2021 (Thu) 13:50:30 [Preview] No.14666 del
wdym "leaks to the military" it's?

Anonymous 04/10/2021 (Sat) 21:38:18 [Preview] No.14678 del
(830.49 KB 622x1092 SNAIL.mp4)
Schizo indeed you are. Here have a video about a snail.

Anonymous 04/12/2021 (Mon) 04:51:27 [Preview] No.14679 del
Isn't everything backdoored nowadays OP?

Neofetch Anonymous 04/06/2021 (Tue) 21:53:21 [Preview] No. 14668 [Reply] [Last 50 Posts]
NEOFETCH. show us your neofetches! Don't be afraid, we all have crappy processors.

Anonymous 04/06/2021 (Tue) 21:55:41 [Preview] No.14669 del
oh cool another thread of retards showing off shit they wasted too much time on that nobody cares about
install windows and get a job kid lol

Anonymous 04/07/2021 (Wed) 07:51:13 [Preview] No.14670 del
hurry up and die like you keep promising you fucking worthless tard

Anonymous 04/08/2021 (Thu) 13:08:35 [Preview] No.14671 del
You're sharing too much information

Anonymous 04/08/2021 (Thu) 22:18:23 [Preview] No.14672 del
(4.78 KB 640x480 out.png)
neofetch is bloat!

(110.44 KB 900x900 cirno___.jpg)
Response to RMS the hacker known as 4chan 04/06/2021 (Tue) 14:36:45 [Preview] No. 89 [Reply] [Last 50 Posts]
They're attacking you for two reasons:
1) To save money: To prevent another multi-million dollar settlement (FSF vs Cisco). With you gone it wont happen. They also don't want to have to "pay off" the FSF by contributing donations either (which would increase your ability to hire lawyers and sue violators (even when the outcome of the action is difficult to predict (thus no contingency))).

2) Cultural reasons: the rest of the "they" believe that you like young girls: In your heart. And they oppose any man liking girls. That is: they believe you have thoughts and they oppose any man having such thoughts. Men are mules that must work for, fight, and give their life for women, their country, etc. Not live for themselves. Not have happiness. Only toil and responsibility.

You noted once that your life has been incredibly sad.
Being denied the purest love would fit the bill.

They hate you for what they think you believe in your mind. What they believe that they have deduced from your previous wrightings. They hate you for your thoughts they ascribe to you. For having those thoughts. For being capable of having those thoughts.

We've been defending you in the various programmer and anime forums, including your previous statements. For years, and now aswell. The namecalling is going every which way and both sides hate eachother:

On one side there are the old hackers, the men, and the anime-lovers, the NEETs. The beloved language is C.

On the other side are the wage-workers, and the Rust programming language (C++ ... plus plus... basically: and it takes just as much memory to compile as C++ code).

The fight is as hot as molten lead: and there is real true hatread.

Message too long. Click here to view full text.

the hacker known as 4chan 04/06/2021 (Tue) 14:37:18 [Preview] No.90 del
(78.50 KB 850x605 cirno__2.jpg)
The other side bans us and deletes our words in every area they can. They attempt to fire us (sorry: we don't have programmer jobs: we are hackers and NEETs: we code for pleasure: not danegeld) We wonder what happens when words cannot be spoken?

Bascially it's libertarians vs "correctly-thinking" americans. C vs Rust.
Neets vs Wage-workers.
Hackers vs Corps (but I repeat myself).

We wanted a world where we had freedom. To have the freedoms that men of the ancient times had. And we, who defend you, agree with the statements you recanted under pressure.

(For the record: one of the projects I contribute to (fully free-software) is ChaosEsque:Anthology (3d FPS with over 200 weapons, and procedural generation of cities with building interiors), and we've added a statement of support to our project page on moddb in support of you and your rights, we also battle in the forums, we have also been signed to the support letter)

the hacker known as 4chan 04/06/2021 (Tue) 14:40:02 [Preview] No.91 del
(70.67 KB 720x604 9xqy0s04r3jz.jpg)
(in response to:)
>[[[ To any NSA and FBI agents reading my email: please consider ]]]
>[[[ whether defending the US Constitution against all enemies, ]]]
>[[[ foreign or domestic, requires you to follow Snowden's example. ]]]
>I appreciate your moral support.
>Would you like to support me in a practical way?
>You could post for me in public forums where people
>are arguing about this. Especially the ones where my supporters
>are NOT the majority. Stay calm, and avoid name-calling!
>Here are references useful to publicize:
>* To state support.

Message too long. Click here to view full text.